@REISEN: I wouldn't put implanted medical devices in the same risk category as "smart" home appliances. You have a couple of layers of added safeguard protection.

Your doctors and the device maker are responsible (in both senses of the word). It's also probable that your device can't be reprogrammed remotely. Interception and misuse of your device's sensor data is technically possible; but hard to imagine anyone wanting to. Contact your doctor, if you need more reasons not to worry about it. -- Wish you well.

I am the owner of an internal defibulator (could be a pacemaker for arguments sake) and it has a wireless output to a small box in my kitchen to transmit data and box by phone to hospital. Now I wonder about that?

"...computer systems have proven to be vulnerable, why should we trust IOT personal items to be any different?" In some ways IOT is worse - principally, in that compromise is less noticeable, until it's painfully obvious. Even when attackers make no special effort to remain undetected, IoT device processing is generally not user interactive, and a hack doesn't have to be disruptive: "Ah! The fridge door located at this address hasn't been opened in 3 days; I bet they're out of town."

The fault lies with the companies who have unleashed an immature technology upon the world in a rush to grub for more money. Many regular computer systems have proven to be vulnerable, why should we trust IOT personal items to be any different?

It's hard to find appliances, cars, office equipment without IoT anymore. And it's frightening. I have a pretty old kitchen, so I'm not worred about it, but when things break down will anything I choose include IoT comms on it? Will I have the choice of turning off any communication? How will this affect self driving cars. This really is could become very scary.

I agree with the 1st post. We've reared of a generation of me, dependent, and spoiled. Far in between there are golden nuggets, but they may not be easy to find.

"...three creators of Mirai come to justice..." 5 years and $250k fines are a lot for people that didn't kill anyone; but trivial compared to the economic damage they caused. I hope we all realize that economic damage can severely damage lives - even fataly.

"...developed Mirai in their dorm room." That highlights the culture component of the problem. Solutions there will be difficult and generational.

Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.

Published: 2017-05-09NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.